Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 13 of 13 (0.004 secs)
You searched for: subject:"Optional Header"
[texts]Open Apple-Vol 5 No 03-APR 1989
Open Apple-Vol 5 No 03-APR 1989
Keywords: apple; dif; data; llgs; program; file; programs; header; appleworks; merlin; dif file; dif files; header items; apple llgs; word processor; system disk; optional header; data base; apple dealer; spreadsheet program
Downloads: 28
[movies]The Life Of Binaries Day 2 Part 5 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,560
[movies]The Life Of Binaries Day 1 Part 5 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,145
[movies]The Life Of Binaries Day 1 Part 1 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 3,670
[movies]The Life Of Binaries Day 1 Part 6 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,115
[movies]The Life Of Binaries Day 2 Part 2 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,885
[movies]The Life Of Binaries Day 1 Part 4 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,116
[movies]The Life Of Binaries Day 2 Part 4 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,864
[movies]The Life Of Binaries Day 1 Part 3 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,089
[movies]The Life Of Binaries Day 2 Part 6 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,902
[movies]The Life Of Binaries Day 1 Part 2 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,644
[movies]The Life Of Binaries Day 2 Part 3 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,650
[movies]The Life Of Binaries Day 2 Part 1 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,660
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related creators

Xeno Kovah

Related mediatypes

movies
texts

Terms of Use (10 Mar 2001)